Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe
Resource
win7-20230824-en
General
-
Target
ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe
-
Size
13.7MB
-
MD5
f49824e72e834e576ee0b8d5422e9d5f
-
SHA1
954cf4b74cd1d2d0245a01f2506fc3dd4c2b121d
-
SHA256
ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06
-
SHA512
0418529304a8b32c1d22a8a38f9eccc567ba50b068dab158083b5fa29007d248fee5dc516aa28fced4de0710a0ac4f266f03ae67fb94db8bef0020514a9e21f6
-
SSDEEP
393216:lVoJYHTpQgJMI0KXh7zd4E7SBU8gWPXCP:XOoTpQgaxmhfdWURrP
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral2/memory/112-3-0x0000000003D20000-0x0000000003E60000-memory.dmp family_blackmoon behavioral2/memory/3696-9-0x0000000001F30000-0x0000000001F59000-memory.dmp family_blackmoon behavioral2/memory/3696-10-0x0000000003CE0000-0x0000000003D1D000-memory.dmp family_blackmoon behavioral2/memory/2228-21-0x0000000003BC0000-0x0000000003D00000-memory.dmp family_blackmoon behavioral2/memory/1636-31-0x00000000020F0000-0x000000000212D000-memory.dmp family_blackmoon -
Executes dropped EXE 2 IoCs
pid Process 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 1636 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\F: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\G: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\H: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\I: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\P: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\T: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\B: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\L: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\O: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\Q: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\S: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\E: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\K: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\M: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\R: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\X: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\Y: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\Z: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\A: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\J: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\N: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\V: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\W: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe File opened (read-only) \??\a: ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe Token: SeDebugPrivilege 1636 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 1636 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 1636 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 112 wrote to memory of 3696 112 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 81 PID 3696 wrote to memory of 2228 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 88 PID 3696 wrote to memory of 2228 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 88 PID 3696 wrote to memory of 2228 3696 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 88 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89 PID 2228 wrote to memory of 1636 2228 ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe"C:\Users\Admin\AppData\Local\Temp\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exeC:\Users\Admin\AppData\Local\Temp\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3696 -
F:\ÙÈÔ´«¿Í»§¶Ë\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe"F:\ÙÈÔ´«¿Í»§¶Ë\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe" 3696 "C:\Users\Admin\AppData\Local\Temp\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
F:\ÙÈÔ´«¿Í»§¶Ë\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exeF:\ÙÈÔ´«¿Í»§¶Ë\ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5929f691984adc8a3bcd1d208a500d8ab
SHA1d7160b32a35dc0d764305290797de8cf2be21525
SHA256d927e8bcd8732a1be70ffa79253b7d08dbcf1360ecbc7d1426ec545752cb9afa
SHA512909f72e306ba406137ca57a43af6a9d4e2acccf0dbd676cedf166a349f6b284bb8e5327ea31d2f2af3902f9f3dde83f40f6abb666b31d2ba3091b1fe0a292c35
-
Filesize
13.7MB
MD5f49824e72e834e576ee0b8d5422e9d5f
SHA1954cf4b74cd1d2d0245a01f2506fc3dd4c2b121d
SHA256ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06
SHA5120418529304a8b32c1d22a8a38f9eccc567ba50b068dab158083b5fa29007d248fee5dc516aa28fced4de0710a0ac4f266f03ae67fb94db8bef0020514a9e21f6
-
Filesize
13.7MB
MD5f49824e72e834e576ee0b8d5422e9d5f
SHA1954cf4b74cd1d2d0245a01f2506fc3dd4c2b121d
SHA256ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06
SHA5120418529304a8b32c1d22a8a38f9eccc567ba50b068dab158083b5fa29007d248fee5dc516aa28fced4de0710a0ac4f266f03ae67fb94db8bef0020514a9e21f6
-
Filesize
13.7MB
MD5f49824e72e834e576ee0b8d5422e9d5f
SHA1954cf4b74cd1d2d0245a01f2506fc3dd4c2b121d
SHA256ca5299973587001a774aa10bb713d8a966e1313ae143f74c6d53c70c53174c06
SHA5120418529304a8b32c1d22a8a38f9eccc567ba50b068dab158083b5fa29007d248fee5dc516aa28fced4de0710a0ac4f266f03ae67fb94db8bef0020514a9e21f6